Problem solve Get help with specific problems with your technologies, process and projects.

Protecting the workstation from physical and electronic theft

Here is some advice for keeping the data on your PCs physically and electronically safe.

This tip was submitted to the SearchSecurity Tip Exchange Contest by user Wallen Pabericio. Let other users know...

how useful it is and help Wallen win a prize by rating the tip below.

There are two ways to access information: Physical, being on the computer which has the information and electronic, being on another station through hacking or other relatad process.

The first problem could be solved several ways:

  • Locate the workstation where it it visible but not in an active area where everyone can pass by or stand about passing time.
  • Physically lock out the device.
  • Use electronic passwords, etc.
  • Code and hide important files on unexpected "program files," give them numeral designations instead of phonetic names, and add .exe or .gif, etc. filenames to further wayward unexpected visitors.
  • Store important files on rewritable CDs instead of the hard drive, and keep them a safe place.

    For Net hackers:

  • It is possible to install a toggle switch to the telephone/modem line so that the computer will only be accessible to the Net if this switch is on.
  • This switch also doubles as a panic button, should you sense an unauthorized up or download. Although this switch is a useless defense against sleeper programs that send out information the moment you go online (that's another problem), this will give you a chance to correct for such probability before going in.
  • You may want to install a timer to this switch so that the computer may become available on the Net for a certain span of time, which only you will know of.
  • Use this with other appropriate electronic firewalls and counter measures to increase your security.
  • Know your programs/software well. Any file not related or used should be immediately deleted.
  • Record a tree of your system and counter check this record every once in awhile to help identify rogue files. Be especially aware of bytes used.
  • This was last published in April 2002

    Dig Deeper on Information Security Incident Response-Information



    Find more PRO+ content and other member only offers, here.

    Start the conversation

    Send me notifications when other members comment.

    By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

    Please create a username to comment.